Tabu Search Against Permutation Based Stream Ciphers

Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that th...

全面介紹

書目詳細資料
Main Authors: Iwona Polak, Marcin Boryczka
格式: Article
語言:English
出版: Polish Academy of Sciences 2018-05-01
叢編:International Journal of Electronics and Telecommunications
主題:
在線閱讀:https://journals.pan.pl/Content/103842/PDF/20_1157-4308-1-PB.pdf